Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Importance of 24×7 Communications in a Legal Setting

At OnPage, we communicate and interact with legal practices, understanding how their needs are changing, while helping them transform their operations. Through these conversations, we learned that an increasing number of practices look to transition to 24×7 after-hour communications, allowing potential and existing clients to reach legal practitioners (i.e., lawyers) at any time.

Finding Your Sweet Spot: Company Size and Digital Workplace Experience

So much goes into making a workplace suitable for employees—flexibility, salary perks, team dynamics, etc.—but sometimes we forget that technology is paramount to allowing people to be productive and engaged. I experienced this first hand years ago during an internship. I worked for an intelligence organization and assumed I’d be surrounded by the latest and greatest in digital devices and tools. I was wrong.

Cux - Innovating Testing Trends

When starting an online business, people are usually not aware of what their targeted audience needs to see and how they will see it. For instance, businesses don’t realize why website visitors don’t convert into paying customers. Well, there could be several issues triggering such an occurrence like unattractive UI, complicated webpage view, or long response time. Tackling such issues and tracking website visitor behavior thus became an area of interest for most organizations.

Custom Nagios plugins

Nagios is a well-known monitoring framework; it’s also known for its plugins, the software components that are actually providing monitoring capabilities. IPHost allows using Nagios plugins directly; we have detailed instructions on setting up and using Nagios plugins; below is the essence of these instructions. Plugins can be anything executable – native application, a script file (including Unix shell files or Windows PowerShell scripts) and so on.

Monolith to Microservices: Is Your Organization Ready?

Transitioning from a Monolith to a Microservices architecture can take years to complete. The internet is full of stories of companies famously making this transformation. But how do you know if it’s right for your organization? Is your organization ready? In this article, we will look at five questions you can ask to see if you’ll benefit from a Microservices architecture. We’ll also discuss five challenges you will face during this transformation.

Introducing the New Rollbar UX

When we first built Rollbar, microservice architectures and continuous delivery practices weren't as common as they are today. Over time, we saw how our customers were setting up different projects for each code repository. As a complex distributed architecture becomes the norm, we want to make sure our core user experience reflects this new normal. Today, we’re introducing the new Rollbar user experience. We hope you like it as much as we have enjoyed building it for you!

Incident Response 2.0 - The Zenduty Incident Command System(ICS)

We are super excited today to introduce our latest Zenduty integration with Slack, which we are calling the Zenduty Slack Incident Command System(Slack-ICS). This was many months in the making and went through multiple iterations and it is something we believe will redefine proactive incident management and response.

Black Friday 2019 Website Performance Report by Uptime.com

Tis’ the season for website downtime. No matter how great your web infrastructure is, many ecommerce sites experience downtime on Black Friday. You’re not alone. New research by Google Cloud says that one out of ten retail executives reported downtime on Black Friday 2018, and four out of ten reported outages during one of the past three years.

What is vulnerability management and why should enterprises adopt it?

In the current digital era, enterprises across the world heavily rely on information systems for day-to-day operations and for accessing business-related data. In essential institutions, such as banking and financial, health, and government, protecting information is critical and any security mishap could disrupt daily operations. The intention of attackers is to either deny services until a ransom is paid or breach security to gain access to critical information.